Sciweavers

1818 search results - page 276 / 364
» How users use access control
Sort
View

Publication
261views
17 years 2 months ago
Improving Explicit Congestion Notification with the Mark-Front Strategy
Delivering congestion signals is essential to the performance of networks. Current TCP/IP networks use packet losses to signal congestion. Packet losses not only reduces TCP perfor...
Chunlei Liu, Raj Jain,
AIIA
2007
Springer
15 years 10 months ago
A 3D Virtual Model of the Knee Driven by EMG Signals
A 3D virtual model of the human lower extremity has been developed for the purpose of examining how the neuromuscular system controls the muscles and generates the desired movement...
Massimo Sartori, Gaetano Chemello, Enrico Pagello
BCSHCI
2007
15 years 5 months ago
Interaction design in the wild
The StoryBank project in the UK is exploring the application of digital storytelling technology to information sharing in the developing world. A multidisciplinary team of interac...
Dorothy Rachovides, David Frohlich, Maxine Frank
COLING
2002
15 years 3 months ago
Text Authoring, Knowledge Acquisition and Description Logics
We present a principled approach to the problem of connecting a controlled document authoring system with a knowledge base. We start by describingclosed-world authoring situations...
Marc Dymetman
CIDR
2003
164views Algorithms» more  CIDR 2003»
15 years 5 months ago
Capacity Bound-free Web Warehouse
Web cache technologies have been developed as an extension of CPU cache, by modifying LRU (Least Recently Used) algorithms. Actually in web cache systems, we can use disks and ter...
Yahiko Kambayashi, Kai Cheng